system check message question

Ben Beeson beesond001 at hawaii.rr.com
Tue May 1 23:52:44 PDT 2001


Jeff,

	Thanks for the info, and yes, I do subscribe to SECURITYFOCUS...  I
find it interesting to see what everyone is up to.  I must admit though, I
don't understand it all yet...

Still learning,

Ben 



On Tue, 01 May 2001, you wrote:
> Alot of the time, attackers are not really interested in getting a direct
> response from a target computer.  One of the attacks that has been under
> discussion recently involves a trojan program which opens a raw socket a
> listens for traffic that matches a particular pattern.  Because it uses a
> raw socket, it acts simillar to a promiscuous interface and isn't fully
> bound to a particular port number.  This way it won't show up as an open
> socket on port scans.  Once it finds a 'trigger' packet it will fully bind
> to a port for x amount of time and send an 'I am rooted' message to
> whereever its set for.  Since these types of attacks do not directly
> contact the attacking host, spoofed IP's work fine.  I'm sure there are
> other uses for spoofed ip besides this and DOS attacks.
> 
> Note:  Last I heard several of these single packet to port 31137 incidents
> have been tracked back to a road runner address.  If your interesting in
> keeping up with the latest in security, etc. check out
> www.securityfocus.com .  They have several mailing lists for security
> issues and get alot of traffic.  To much traffic actually, I find myself
> just hitting delete on those messages automatically :(
> 
> Jeff Wong
> 
> 
> On Tue, 1 May 2001, jay wrote:
> 
> > what i don't understand is where would spoofing 1.2.3.4 get you
> > unless you were either using loose source routing or sniffing
> > traffic on the same wire and could see an ack go out?
> > that one entry doesn't look like an attempt at a DDOS.  unless
> > they were using the nmap decoy option, but then you'd be seeing
> > other scans on that port by different IPs...
> >
> > am i thinking about this too much?
> > time for a nap.
> >
> > =jay
> >
> > On Mon, 30 Apr 2001, Jeffrey Wong wrote:
> >
> > > There have been alot of reports of people seeing the exact same thing over
> > > the last two weeks.  I havn't really heard much about it besides that its
> > > been seen though.  It seems to (so far) be just a passive scan with no
> > > accompaning attacks, although I'd assume that if you do have Back Orifice
> > > installed . . .  1.2.3.4 is just one of the more commonly spoofed IP's.
> > > In fact its used as an example IP in alot of different places.  I guess
> > > these new script kiddies either have no imagination, or no idea that they
> > > can change it ;)
> > >
> > > Jeff Wong
> > >
> > > On Mon, 30 Apr 2001, Ben Beeson wrote:
> > >
> > > > Aloha all,
> > > >
> > > > 	The below line appeared in my /var/log/messages file and I am curious
> > > > about it.  I think port 31337 is for Back Orifice, a windows attack that I
> > > > should be relatively immune from.  However, that said, I am curious how the IP
> > > > address 1.2.3.4 materialized.  I am not sure that this is a 'legal' address.
> > > > 'dig' returns nothing.....  Has anyone else seen this???
> > > >
> > > > Thanks,
> > > >
> > > > Ben
> > > >
> > > >
> > > > Security Violations
> > > > =-=-=-=-=-=-=-=-=-=
> > > > Apr 29 16:50:39 kernel: Packet log: input DENY eth0 PROTO=17 1.2.3.4:1024 24.94.83.89:31337 L=81 S=0x00 I=20326 F=0x0000 T=111 (#8)
> > > >
> > > > ---
> > > > You are currently subscribed to luau as: jmwong at math.ed.hawaii.edu
> > > > To unsubscribe send a blank email to $subst('Email.Unsub')
> > > >
> > >
> > >
> > > ---
> > > You are currently subscribed to luau as: jay at musubi.org
> > > To unsubscribe send a blank email to $subst('Email.Unsub')
> > >
> >
> >
> > ---
> > You are currently subscribed to luau as: jmwong at math.ed.hawaii.edu
> > To unsubscribe send a blank email to $subst('Email.Unsub')
> >
> 
> 
> ---
> You are currently subscribed to luau as: beesond001 at hawaii.rr.com
> To unsubscribe send a blank email to $subst('Email.Unsub')



More information about the LUAU mailing list